US7721294B2 - Object transfer control in a communications network - Google Patents
Object transfer control in a communications network Download PDFInfo
- Publication number
- US7721294B2 US7721294B2 US10/509,979 US50997905A US7721294B2 US 7721294 B2 US7721294 B2 US 7721294B2 US 50997905 A US50997905 A US 50997905A US 7721294 B2 US7721294 B2 US 7721294B2
- Authority
- US
- United States
- Prior art keywords
- component
- priority
- objects
- requested
- requested object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/61—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/62—Establishing a time schedule for servicing the requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
Definitions
- the invention generally relates to the field of communications networks and more particularly to an object transfer from a first network component via an intermediate component to a second network component, the second network component being remote from the first network component.
- the transfer of information over modern communications networks like the public Internet or internal networks is based on specific transfer protocols.
- the World Wide Web for example, which constitutes a major aspect of the Internet, uses the Hyper Text Transfer Protocol (HTTP) for exchanging files comprising text, images, sound, video, and other contents.
- HTTP Hyper Text Transfer Protocol
- Any WWW server contains, in addition to the files it can serve, an HTTP component that is designed to wait for HTTP requests and to handle them when they arrive.
- a WWW browser can be considered as an HTTP client that is configured to send HTTP requests to WWW servers. Whenever a user of the browser enters a file request by either “opening” a WWW file (by typing in a Uniform Resource Locator (URL)) or by clicking on a hyper text link, the browser builds a corresponding HTTP request for the file and sends it to the destination address. The HTTP component in the destination server receives the HTTP request and returns the requested file.
- URL Uniform Resource Locator
- the requested file may be constituted by a Hyper Text Mark up Language (HTML) page that includes HTML code.
- HTML Hyper Text Mark up Language
- the browser receives the HTML page from the server and detects that the HTML code, which can be considered as an object itself, includes further objects such as (background) images, sounds, scripts or HTML frames, the browser issues further HTTP requests to the server in order to fetch the further objects which are included in the HTML code.
- the server Upon receipt of the further HTTP requests, the server sends HTTP responses including the requested objects like images to the browser. As becomes apparent from FIG. 1 , the HTTP responses are sent from the server to the browser running on the client in the same order as the browser has issued the HTTP requests.
- the order in which any additional objects included in the HTML code of the HTML page are requested by the browser usually depends on how the HTML page was written. For example an object that is included at the beginning of the HTML code is not necessarily displayed at the top of the HTML page because features such as tables, layers and frames allow the HTML author to use complex layouts.
- the order in which a browser issues HTTP requests depends also on internal browser algorithms. For example some browsers use complex heuristics for generating the HTTP requests by starting with requesting the first four objects as they appear in the HTML code of the page. After the first four objects have been requested, every second object starting from the top of the area that is currently visible to the user is requested, then every fourth object and so on. Other browsers use a simpler algorithm that requests the objects one by one as they appear in the HTML code. From the above it becomes apparent that it is usually difficult to predict the order in which HTTP requests for objects referred to in an HTML code are generated.
- HTTP/1.1 Transfer Control Protocol
- TCP Transfer Control Protocol
- this need is satisfied by a method of controlling in a communications network an object transfer from a first component via an intermediate (hardware or software) component to a second component which is remote from the first component, wherein the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes to be processed by the second or another component of the communications network and wherein the intermediate component performs the steps of sending an object request to the first component, receiving the requested object from the first component, at least one of assessing and updating a priority of the requested object, wherein an initial priority has been assigned to the requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object, and, in dependence of the priority of the requested object, delaying the requested object or forwarding the requested object to the second component.
- An object may itself comprise code portions referring to one or more further objects.
- a code may itself form a (e.g. previously requested) object.
- the overall transfer of objects is improved from a user's point of view (even if the total amount of data to be transferred is not decreased) because important objects are transferred preferentially.
- the object transfer from the first network component to the second network component becomes more predictable. For example objects being of higher significance to the user may be assigned a higher priority and may thus be preferentially transferred to the second component.
- objects being of lesser significance may be delayed. In the extreme case an object having a low significance may be delayed to such an extent that it is not transferred to the second component at all. This allows to control the order in which objects are received by the second component.
- the assignment of absolute or relative priorities to objects may be performed dynamically. Once a priority has initially been assigned, this priority may be assessed with respect to specific absolute values like thresholds or with respect to priorities of other objects. Based on the assessment it can be decided whether or not an object is to be delayed. Prior to the assessment a priority initially assigned to an object may be evaluated anew with the purpose of determining whether the initial priority has to be updated.
- the intermediate component may be operated to re-order objects received from the first component.
- the delaying of objects is thus preferably performed such that the order in which the intermediate component receives the objects from the first component differs from the order in which the objects are forwarded to the second component.
- the reordering may be based on the priorities of the objects to be transferred. During the reordering there might arise the situation that due to the delay of some objects the transfer of other objects is actually accelerated.
- the object request that is sent to the first component may be generated by the intermediate component.
- the object request may be generated by the second component and sent to the intermediate component.
- the object request may be processed by the intermediate component and forwarded to the first component.
- the received object may either be delayed or directly forwarded to the second component.
- Delaying of the requested object can for example include at least one of instructing the second component to repeat the object request, suspending a connection to the second network component via which the requested object is to be forwarded, and informing the second component that the requested object will automatically (e.g. without any further object request from the second component) be forwarded to the second component at a later point in time.
- the intermediate component may perform the steps of assigning a specific attribute to the object to be delayed, informing the second component of the attribute, receiving a reference to the attribute (e.g. the attribute Itself or an unambiguous reference derived from the attribute) from the second component, and, upon receipt of the reference to the attribute, sending the delayed object to the second component or further delaying the delayed object.
- the decision whether a delayed object is to be sent to the second component or delayed may be based on the newly assessed relative priority of the repeatedly requested object.
- the attribute can be considered as a common denominator which enables the intermediate component and the second component to negotiate about the transfer of the object to which the attribute has been assigned.
- the form of the attribute will depend on the characteristics of the transfer protocol that is used for the object transfer. In the case of HTTP for example, the attribute may be constituted by a virtual URL created by the intermediate component.
- the attribute-based delay scheme of instructing the second component to repeat the object request can generally be used to delay objects and does not necessarily require that priorities have been assigned to the objects to be transferred.
- the object may be send from the intermediate component to the second component in response to an object request received from the second component or in accordance with a pushing scheme, i.e. independently of such an object request from the second component. If the delay scheme is based on an object request received from the second component, the second component may be informed about the attribute in context with an instruction to repeat the object request. In such a case the reference to the attribute may be received by the intermediate component in context with a repeated object request from the second component.
- the objects to be transferred to the second component may be forwarded to the second component via a single or via a plurality of connections between the intermediate component and the second component.
- selected ones of the connections to the second component may be suspended dependent upon the (initial or updated) priorities of the requested objects that are to be forwarded via the selected ones of the connections to the second component.
- the intermediate component may thus suspend one or more connections so that objects having a high priority can make use of the additional bandwidth that is released on the link between the intermediate component and the second component.
- the intermediate component is preferably configured such that it ensures that a link formed by two or more connections is fully used before suspending one or more connections thereof.
- the connection may be reopened at a later point in time in the same state in which it was closed.
- the connection may be completely closed without saving any information about the state of the connection.
- the second component can be informed that the one or more objects to be transmitted via the closed connection will be sent later, either in response to or independently from a (repeated) object request.
- the object transfer may also be delayed by a priority based adjustment of the transfer speed.
- a specific share of processing capabilities may be dynamically allocated to each object or each connection. In the case of multiple connections, all connections or at least some connections get a share of the CPU time, i.e. a share of the network bandwidth.
- the share of processing capabilities allocated to a specific connection may be changed (e.g. decreased constantly) while one or more objects are transferred via the respective connection.
- the object transfer is based on a plurality of object requests relating to objects referred to in one or more codes.
- a code is readily available to at least one of the second and the intermediate component.
- the code has yet to be loaded by either one of the second and the intermediate component.
- the intermediate component may send a code request that has been generated by the second component or by the intermediate component to the first component or a third component that is different from the first component.
- the requested code is received from the first or the third component, it may be analyzed by the intermediate component with respect to references to objects comprised within the code. Any references to objects contained in the code may then be assessed with the purpose of assigning (initial) priorities to the objects referred to in the received code.
- the code received from the first or the third component may eventually be forwarded by the intermediate component to the second component.
- the requested object contained in the response may be evaluated with respect to the received object's priority. For example at least one of the object size, the object content and a header of the response may be analyzed to that end. It can then be determined whether or not an initial priority of a received object has to be updated.
- each object or each class of objects is stored for example by the intermediate component.
- the stored information may comprise priority information for individual objects or a classes of objects, preferably, in the form of a priority list.
- This priority list may be repeatedly assessed. Such an assessment can relate to at least one of updating priority information and deleting objects or classes of objects from the priority list.
- the invention may be implemented as a hardware solution or as a software solution.
- the invention may be realized in the form of a computer program product comprising program code portions for performing the individual steps of the invention.
- the computer program product may be stored on a computer readable recording medium.
- the intermediate component is implemented as a proxy component in the form of a piece of software running on the first or the second component of the communications network.
- the intermediate component may be constituted by a separate piece of hardware like a proxy server arranged between the first and the second component in the communications network.
- the intermediate component may include one or more appropriately configured communication interfaces for communicating with at least the first and the second component of the communications network as well as a unit for performing the processing in context with delaying of objects.
- first link between the intermediate component and the first component and a second link between the intermediate component and the second component.
- first link and the second link have different transfer rates.
- a fast link may be provided between the intermediate component and the first component and a comparatively slower link may be provided between the intermediate component and the second component.
- the first component is a network server
- the second component is a network client
- the intermediate component is located in the vicinity of (in terms of network links) or on the network server.
- the intermediate component could also be located close to (in terms of network links) or on the network client. In such a case the link between the intermediate component and the second component (the network client) has a much higher capacity and lower latency than the link between the intermediate component and the first component (the network server).
- the invention is not restricted to the case that the first component acts as network server and the second component acts as network client.
- the intermediate component could also be used to improve the object transfer between two network clients or two network servers.
- the intermediate component is part of a wireless communications network like a GSM, GPRS, etc. cellular network.
- the second component may be constituted by a mobile terminal.
- FIG. 1 is a schematic diagram illustrating a transfer of objects between a network server and a network client in accordance with HTTP;
- FIG. 2 is a block diagram of a network system comprising an intermediate component in the form of a HTTP proxy server according to the invention
- FIG. 3 is a block diagram of the HTTP proxy server of FIG. 2 ;
- FIG. 4 is a schematic diagram depicting a redirection-based object delay in the network system depicted in FIG. 2 ;
- FIG. 5 is a flow chart reflecting the steps preceding an object delay
- FIG. 6 is a flow chart depicting the decisions involved in an object transfer according to the invention.
- FIG. 7 is a block diagram depicting a proxy component according to the invention located on a network client.
- FIG. 2 a block diagram of a network system 10 according to the invention is depicted.
- the network system 10 comprises a first component in the form of a server 20 , an intermediate component in the form of a HTTP proxy server 30 and a second component in the form of a client 40 .
- the proxy server 30 is arranged in the network system 10 such that it has a fast link 12 towards the server 20 and a comparatively slower link 14 towards the client 40 .
- Each link 12 , 14 is constituted by a plurality of TCP connections 50 .
- Each TCP connection 50 is configured to allow the transfer of HTTP requests and HTTP responses between the server 20 and the client 40 .
- the proxy server 30 performs some traditional proxy functions like caching and filtering of objects. Additionally, the proxy server 30 is configured to artificially delay an object that is received from the server 20 and that is to be forwarded to the client 40 . This is done by using a combination of temporary suspension of data transfer on some connections 50 and HTTP redirection messages that force a browser running on the client 40 to repeat an object requested after a certain period of time. By using these mechanisms the proxy server 30 re-orders the HTTP responses received from the server 20 in such a way that objects having a higher priority are delivered to the client 40 first. For that purpose the proxy server 30 dynamically assigns priorities to the objects to be forwarded to the client 40 . In order to ensure that delaying of the less important objects does not cause the link 14 between the proxy server 30 and the client 40 to become idle, the proxy server 30 continuously or at least repeatedly monitors the traffic on this link 14 .
- the proxy server 30 comprises a communications interface 32 coupled between the first link 12 to the server 20 and the second link 14 to the client 40 .
- the communications interface 32 is configured such that it enables the sending of object requests to and the receipt of the requested objects from the server 20 .
- a processing unit 34 of the proxy server 30 communicates with the communications interface 32 .
- the processing unit 34 allows to assess and/or adapt the priority of any object received via the first link 12 from the server 20 .
- the processing unit 34 allows to assign an initial priority to a requested object on the basis of an analysis of at least one of the object request and the code that refers to the requested object. Possible assignment schemes will be discussed later in more detail.
- the processing unit 34 controls the communications interface 32 such that a requested object received from the server 20 is either delayed or forwarded via the second link 14 to the client 40 . If a requested object received from the server 20 is to be delayed, it is temporarily stored in a buffer 36 that can be accessed by both the communications interface 32 and the processing unit 34 .
- the buffer 36 may be implemented as a software or hardware component of the processing unit 34 .
- the processing unit 34 is additionally configured such that it allows to assign a specific attribute to an object which is to be delayed (an exemplary format of this attribute will be discussed later in more detail).
- the processing unit 34 enables to control the communications interface 32 such that the communications interface 32 informs the client 40 about this attribute. If the communications interface 32 receives a reference to the attribute from the client 40 , the processing unit 34 evaluates this reference and controls the communications interface 32 such that the delayed object to which this attribute has previously been assigned and which is currently stored in the buffer 36 is either sent to the client 40 or further delayed. A further delay of the object stored in the buffer 36 may become necessary if objects of a higher priority have to be forwarded to the client 40 first.
- the browser running on the client 40 issues a HTTP request for the corresponding HTML page including HTML code.
- the HTTP request issued by the browser is received by the proxy server 30 via the link 14 and forwarded via the link 12 to the destination server 20 .
- the server 20 replies by sending the HTML code for the requested page to the proxy server 30 , which analyzes the HTML code received from the server 20 to assign an initial priority to any kind of objects like links, frames, scripts, images, etc. referred to in the HTML code (first analysis phase).
- the proxy server 30 forwards the HTML code via the link 14 to the client 40 .
- the browser running on the client 40 receives the HTML page including the HTML code it processes the HTML code. If the browser detects that the HTML code includes further objects, it issues further HTTP requests for the objects referred to in the HTML code. These HTTP requests for further objects are received and evaluated by the proxy server 30 . To most of the requested objects an initial priority will have been assigned already during the proxy server's 30 previous analysis of the HTML code that it has forwarded to the server 40 . However, in this second analysis phase the proxy server 30 either assigns initial priorities to those objects to which a priority has not yet been assigned or updates the priority of such objects to which an initial priority has already been assigned. The priority is updated on the basis of additional information available in the HTTP request received from the client 40 .
- the proxy server 30 forwards any HTTP requests for additional objects received from the client 40 to the server 20 .
- the server 20 replies by sending the requested objects to the proxy server 30 .
- the proxy server 30 analyzes the HTTP responses (including the requested objects) from the server 20 in a third analysis phase and updates—if necessary the priorities of the objects comprised in the HTTP response. Additionally, the proxy server 30 assesses the relative priority of any received object with respect to the priority of previously received objects that are still stored in the buffer 36 (see FIG. 3 ) and the priorities of objects that are expected soon.
- Information regarding the objects that will be received soon from the server 20 can be derived from the HTML code that has previously been forwarded to the client 40 or from HTTP requests from the client 40 for which the corresponding objects have not yet been received from the server 20 .
- the proxy server 30 may be configured such that it compares a priority of an object that has just been received from the server 40 with an absolute value like a priority threshold.
- the proxy server 30 decides if this object is to be delayed, e.g. if this object is to be temporarily stored in the buffer 36 or if the corresponding HTTP request is not yet to be forwarded to the server 20 , or if the object is to be immediately forwarded to the client 40 .
- the intentional delay of individual objects improves the overall object transfer from a user's point of view. It is for example well known that the relative importance of the various objects included in a web page varies greatly: An image that is used to build a graphical menu may be essential for the navigation of a site, while a background image merely makes the page look nicer.
- the invention can thus be employed to provide the user with the more important information first. As soon as there is enough information of a web page displayed on the user's screen, the user can decide to click on a link and request another web page without having to wait for the remaining (less important) parts of the previous web page that is still being transferred. As a result, the user is no longer forced to wait until some uninteresting objects are transferred before being able to see the important ones. This is especially useful in conjunction with the mobile Internet, which is usually slower and more expensive than the fixed Internet.
- the proxy server 30 can assign or adjust the priority of an object to be sent to the client 20 during three different phases, namely when a reference to that object is found in an HTML code (i.e. in a previous object) that is to be forwarded to the client 40 , when a HTTP request relating to that object is issued by the browser running on the client 40 , or when the corresponding HTTP response containing the requested object is received from the server 20 .
- a priority list that contains priority information for individual objects or classes of objects is either generated or updated.
- the individual objects or classes of objects are ordered with respect to increasing or decreasing priority.
- the order of the objects in the priority list can thus be considered as priority information.
- additional priority information like absolute or relative priority values (numbers) may alternatively or additionally be part of the priority list.
- the exact priority assigned to specific objects or classes of objects is implementation-dependent and in the exemplary embodiment configurable by the operator of the proxy server 30 or a user of the browser running on the client 40 .
- the operator of the proxy server 20 could be one or several lists of URLs (using pattern matching) that allow the operator to increase or decrease the priority of the objects appearing on those lists.
- an operator could decide to increase or decrease priority of all images downloaded from an advertising company.
- the same possibilities may be made available to the user.
- the user could send his preferences to the proxy server 30 . This can be done by a specific software running on the client 40 or by using designated web pages provided directly by the proxy server 30 and allowing the user to set his preferences.
- the proxy server 30 can assign an initial priority to an object by analyzing an HTML code that has been requested by the client 40 from the server 20 .
- references to objects referred to in the HTML code may be assessed to that end.
- a priority list may be generated that lists individual objects which are referred to in the HTML code in the following order (objects of highest priority are mentioned first):
- the priority of a specific object can be lowered if the object is not located on the same server 20 or on the same domain as the current HTML page.
- a further possibility to assign or adjust the priority of an object occurs when a request for that object is issued by the browser and received by the proxy server 30 .
- the HTTP request can be analyzed by the proxy server 30 in an URL context (second analysis phase). Since initial priorities have already been assigned during analysis of the HTML code that led to that HTTP request, analysis of the HTTP request will usually result in an adjustment of the initial priority. However, in some cases initial priorities may be assigned also (see above).
- the adjustment or assignment of initial priorities in the second analysis phase can be performed in dependence on additional information available for example in the header of the HTTP request.
- One or more of the following rules for updating the priorities may be implemented:
- the adjustment of object priorities is based on an analysis of the HTTP response from the server 20 .
- the adjustment of the priorities in the third analysis phase (as well as in the second analysis phase mentioned above) can be calculated as a weighted sum of several criteria.
- the weights may be configurable by the operator of the proxy server 30 or the user of the browser running on the client 40 .
- all objects will usually have a priority assigned to them. However, this priority can be updated before sending the requested objects to the client 40 .
- the headers and contents of the HTTP responses received from the server 20 may be assessed. The priorities may then be adjusted in accordance with one or more of the following rules:
- the proxy server 30 sets and updates the priorities of the objects that are to be transferred to the client 40 .
- the proxy server 30 thus keeps some information about each object like the object's URL, priority, time of last request and, if required, some further parameters. However, this information can not be kept forever since otherwise the proxy server 30 would run out of memory. Moreover, if an object to which a high priority has been assigned is never requested, action is preferably taken so that it does not prevent other objects from being transferred.
- the proxy server 30 has to reorder the objects received from the server 20 in such a manner that they are forwarded from the proxy server 30 to the client 40 in an order which reflects the order in the priority list as closely as possible.
- the proxy server 30 reorders the objects received from the server 20 by intentionally delaying objects having a lower priority and by forwarding objects having a higher priority without any substantial delay to the client 40 .
- the proxy server 30 uses a combination of different delay mechanisms to reorder the objects received from the server 20 .
- two of these delay mechanisms namely suspension of TCP connections on the one hand and HTTP redirections on the other hand, will exemplarily be described in more detail
- the link 14 between the proxy server 30 and the client 40 is constituted by a plurality of TCP connections 50 .
- Dependent upon the priorities of the requested objects that are to be forwarded via individual ones of the connections 50 one or more of the connections 50 that are intended for the transfer of objects having a low priority are suspended. This suspension of individual connections releases some bandwidth on the link 14 that is now available for preferentially transferring objects having a higher priority. Consequently, objects having a higher priority will be delivered before objects having a lower priority.
- suspension of an individual connection 50 is performed such that the connection 50 is left open without transferring objects for a certain period of time.
- suspension of a connection 50 could be effected by closing the connection 50 , either with our without saving the state of the connection 50 prior to its suspension.
- the state of the suspended connection 50 is saved, it can be opened at a later point in time in the same state as it has been suspended (i.e. closed).
- connection 50 has the advantage that no extra data has to be sent via the link 14 .
- a connection 50 is suspended only if the released bandwidth can be fully used by some other connections 50 for the transfer of objects having a high priority.
- the proxy server 30 is thus configured such that it checks that the link 14 is fully used before suspending a connection 50 in order not to waste available bandwidth.
- a possible routine for predicting if the link 14 is or will be partially idle includes comparing the average throughput (over the last N seconds) of all connections 50 going to the client 40 with the amount of data that is currently cached or buffered in the buffer 36 of the proxy server 30 (see FIG. 3 ) and is ready to be sent.
- Other and in particular simpler techniques for estimating the utilization of the link 14 could be implemented as well, especially if the available bandwidth on the link 14 is known by other means.
- the proxy server 30 may utilize another delay scheme.
- a possible delay scheme that is applicable in such a case includes instructing the client 40 to repeat an object request at a later point in time.
- HTTP specifies that any HTTP responses must be sent to the client 40 in the same order as the browser running on the client 40 has issued the HTTP requests, it is possible to instruct the browser to retry a HTTP request later. This can be done by sending a HTTP response with the status code “302” to the client 40 , together with the header field “Retry-After”. This header field tells the client 40 to retry his HTTP request after a specified amount of time. In response to the receipt of the status code “302” (possibly including the “Retry-After” header field), current browsers re-schedule the HTTP request after all pending HTTP requests have been processed.
- the status code “302” as specified in the HTTP standard 1.1 tells the browser that a given object can be found (temporarily) at a location that is different from the one that was requested.
- the HTTP response sent to the client 40 includes the new location of the object. This mechanism is used to implement the delay scheme according to the invention.
- the proxy server 30 generates an attribute in the form of a new (virtual) URL for the object to be delayed.
- the proxy server 30 then instructs the browser running on the client 40 to try the HTTP request again, using this temporary attribute (i.e. URL) as the new location of the object.
- the browser is thus instructed to re-schedule the HTTP request at a later point in time.
- the proxy server 30 converts the attribute to the original URL and forwards the HTTP request to the server 20 .
- the original HTTP request could have been forwarded to the server 20 after receipt thereof by the proxy server 30 .
- the HTTP response received from the server 20 is temporarily stored by the proxy server 30 until it receives the repeated HTTP request from the client 40 .
- the inventive delay mechanism discussed above will exemplarily be described in more detail with reference to FIGS. 4 and 5 . It will be assumed that the HTTP request received by the proxy server 30 from the client 40 relates to an object that is considered by the proxy server 30 to be of a low priority.
- the proxy server 30 receives a HTTP request from the client 40 via the link 14 .
- this first request from the client could have the following format:
- the proxy server 30 redirects the client 40 in step 404 to a new (virtual) location and instructs the client 40 to wait for a certain period of time (delay) before retrying the HTM request.
- the redirection message from the proxy server 30 on the basis of the status code “302” as specified in the HTTP standard 1.1 can have the following format:
- the proxy server 30 can now request the object from the server 20 at any time after receipt of the initial HTTP request from the client 40 (step 402 ) and the time at which it decides to deliver the object to the client 40 (steps 406 and 408 ).
- the client 40 After receipt of the above redirection message the client 40 waits for a period of time specified in the redirection message, i.e. five seconds (or until all other objects have been transferred). In step 412 the client 40 then repeats his HTTP request indicating the new (virtual) location as follows:
- the proxy server 30 Upon receipt of the repeated HTTP request from the client 40 , the proxy server 30 decides whether to delay the requested object further (e.g. by suspending a connection 50 or by a further redirection message) or whether to forward the delayed object to the client 40 . If the proxy server 30 decides to forward the delayed object without any further delay, this can be done in the following format:
- step 502 the proxy server 30 receives the HTTP request from the client 40 .
- step 504 the proxy server 30 determines whether the URL included in the HTTP request is a modified URL, i.e. the result of a previous redirection. If this is the case, the proxy server 30 decodes the URL and restores the original location in step 506 and moves via node 508 to step 510 . Otherwise the method directly moves from step 504 via node 508 to step 510 .
- step 510 the proxy server 30 determines if the object requested by means of the HTTP request is already available, i.e. stored in the buffer 36 of the proxy server 30 (see FIG. 3 ). If the object is not already cached, the proxy server 30 requests the object from the server 20 or marks it for later retrieval in step 514 . From step 514 the method moves via node 512 to step 516 . Step 516 can also be reached directly from step 510 via node 512 in the case the object requested by the client 40 is already available.
- step 516 the HTTP response including the requested object is ready to be sent to the client 40 . This corresponds to the first step in the flow chart of FIG. 6 which will be discussed below.
- the redirection message (step 404 in FIG. 4 ) can be sent to the client 40 at any time while steps 502 to 516 are performed or after step 516 . It should be noted that the availability of an object (i.e. whether a requested object is already cached, currently in transfer or whether the object is not requested yet) is a further factor that influences the initial priority of a requested object.
- step 602 the HTTP response is ready to be sent to the client.
- step 604 the priority of this object is evaluated with respect to the fact whether or not the priority has to be updated. If the priority of the object has to be updated, the priority is adjusted in step 604 .
- step 606 the current priority of the object is assessed to find out if it has the highest priority of all objects that are being transferred or that are expected soon. If it is determined In step 606 that the requested object actually has the highest priority, the method moves via node 610 to step 612 . In step 612 the requested object is sent to the client 40 .
- step 606 If the comparison of the priority of the currently requested object with the priority of other objects in step 606 leads to the result that the currently requested object does not have the highest priority, the method continues with step 614 .
- step 606 it should be noted that instead of comparing the priority of the currently requested object with the priorities of other objects it is also possible to compare the priority of the currently requested object with a fixed threshold or to add an offset in the comparison so that two priorities have to be different by more than a predefined threshold before the difference is considered significant enough.
- step 614 the proxy server 30 estimates if the link 14 to the client 40 (see FIG. 2 ) is or will be idle. As explained above, there are several ways to do that. One of them comprises calculating a running average of the maximum amount of data that was sent and acknowledged during the last N seconds over all connections 50 going to the same client 40 . This gives an estimate of the maximum throughput available.
- the result thus obtained is then compared with the amount of data that is ready to be sent on the connections 50 that are not suspended. If the proxy server 30 detects that it does not have enough data to send in order to fill the link during at least one complete round-trip time, then it considers that there is some spare bandwidth on the link 14 towards the client 40 and continues with step 616 .
- step 616 a comparison similar to that of step 606 is performed. If it is determined in step 616 that the currently requested object has a higher priority than all objects expected soon, the proxy server 30 continues via node 610 with step 612 and sends the currently requested object immediately to the client 40 . Otherwise the method continues with step 618 and a redirection message (status code “302”) is sent to the client 40 as discussed above in conjunction with FIG. 4 .
- a redirection message (status code “302”) is sent to the client 40 as discussed above in conjunction with FIG. 4 .
- the decision taken in step 616 can be influenced by the size of the currently requested object (if it is already known). If the object is known to be small (e.g. less than twice the size of a redirection message), then the proxy server will always send the object instead of sending a redirection message, even if the object had been assigned a very low priority until then (this can be considered as one way of updating the priority).
- step 614 If it is determined in step 614 that there is enough data to be sent in order to fill the link 14 , the method continues with step 620 and suspends the connection 50 to the client 40 via which the currently requested object is to be transferred.
- step 622 the proxy server 30 re-evaluates all suspended connections 50 to find out whether any one of the suspended connections 50 are to be opened again.
- the HTTP/1.1 protocol supports the pipelining option, which allows the client 40 to send several requests to the server 20 or proxy server 30 on the same TCP connection without waiting for the previous replies.
- pipelining is used, more than one object that is ready to be sent could be sent on the same connection 50 towards the client 40 . It is apparent that in such a case an object having a low priority could block a second object having a high priority that is to be sent on the same connection 50 . If there are several objects waiting on the same connection 50 , the maximum or average priority of these objects may be determined and considered in steps 606 and 616 . This ensures that objects of lower priority do not block objects of higher priority.
- One of these extension relates to constraining the transfer speed on link 14 in dependence of the priority of the objects to be transferred. This could be done for example by allocating a specific share of processing capabilities to each connection 50 depending on the priority of the objects to be transferred. The priority of the individual objects is decreased while the process is running. If the proxy server 30 processes connections 50 in a round-robin fashion, this feature can be implemented by limiting the amount of data transferred per round on each connection 50 by a number that is derived from the priority of that object.
- the dynamic allocation of processing capabilities can advantageously be combined with the suspension and redirection mechanisms discussed above.
- the processing capabilities can also include any transformation of the objects or codes being transferred.
- the priorities are assigned directly by the browser running on the client 40 .
- the browser can then schedule the HTTP requests for individual objects according to their priority. If the priorities are assigned directly by the browser, there are some additional factors that can be used for refining the priority of each object:
- the browser knows when a user selects a new HTML page from the bookmarks or by typing in a new URL. The browser can thus clear the list of objects that are no longer required.
- a further extension of the invention relates to a proxy component that is located on the same computer (client) as the browser or close to this computer in terms of network links. This situation is depicted in FIG. 7 .
- the client 40 not only comprises a browser component 42 but an additional proxy component 30 (having the structure shown in FIG. 3 ) in communication with the browser component 42 .
- the link 14 between the proxy component 30 and the browser component 42 has a much higher capacity and lower latency than the link 12 between the proxy component and the server 20 (not depicted in FIG. 7 ).
- the client-side proxy component 30 influences the request stream because it cannot do much on the response stream. Based on the priority information derived from the current HTTP request and previous HTTP responses (e.g. previous HTML codes referring to further objects) as well as an estimate of the link availability, the client-side proxy component 30 will decide if a HTTP request should be forwarded to the server and/or if it should reply immediately with a redirection message.
- previous HTTP responses e.g. previous HTML codes referring to further objects
- the decisions to be taken are simpler than depicted in the flow chart of FIG. 6 . More particularly, the decisions can be reduced to evaluating if the currently requested object has a lower priority than some of the objects being transferred or expected to be transferred soon and if the link is already fully used. If both conditions are given, then a redirection message is sent to the browser component 42 . In all other cases, the HTTP request is immediately forwarded to the server.
- the client-side proxy component 30 can suspend the HTTP request until it can take the decision. It will have to take a decision at the latest when the previous objects have been fully received.
- a still further extension of the invention relates to the blocking of downloads for some objects based on their priority. This means that the priority that is assigned to the objects can also be used to block the objects completely. If a threshold on the priority has been set, any object that has a priority that is lower than this threshold will not be sent to the client 40 . In this case the proxy server (or proxy component) 30 would simply return one of the “4xx” or “5xx” status codes defined in the HTTP/1.1 standard to the client 40 when it detects such an object. Possible status codes are “403 forbidden”, “409 conflict” or “503 service unavailable”.
- a pre-fetching mechanism allows the proxy server 30 to fill its buffer 36 (see FIG. 3 ) with some objects before the client 40 actually requests them.
- Such a pre-fetching mechanism may for example be based on the analysis of a HTML code that is sent from the proxy server 30 to the client 40 and that includes references to further objects.
- the proxy component 30 Based on the analysis of the references to the objects the proxy component 30 assigns priorities to the individual objects and on the basis of this assignment it is defined which objects are to be pre-fetched and in what order.
- the objects are pre-fetched starting with the objects having the highest priority.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Polymers With Sulfur, Phosphorus Or Metals In The Main Chain (AREA)
- Communication Control (AREA)
- Small-Scale Networks (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/276,780 US20090077205A1 (en) | 2002-04-05 | 2008-11-24 | Object transfer control in a communications network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2002/003802 WO2003085924A1 (en) | 2002-04-05 | 2002-04-05 | Object transfer control in a communications network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/276,780 Continuation US20090077205A1 (en) | 2002-04-05 | 2008-11-24 | Object transfer control in a communications network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050240940A1 US20050240940A1 (en) | 2005-10-27 |
US7721294B2 true US7721294B2 (en) | 2010-05-18 |
Family
ID=28685820
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/509,979 Expired - Lifetime US7721294B2 (en) | 2002-04-05 | 2002-04-05 | Object transfer control in a communications network |
US12/276,780 Abandoned US20090077205A1 (en) | 2002-04-05 | 2008-11-24 | Object transfer control in a communications network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/276,780 Abandoned US20090077205A1 (en) | 2002-04-05 | 2008-11-24 | Object transfer control in a communications network |
Country Status (10)
Country | Link |
---|---|
US (2) | US7721294B2 (zh) |
EP (2) | EP1650931B1 (zh) |
CN (1) | CN100531186C (zh) |
AT (2) | ATE413763T1 (zh) |
AU (1) | AU2002257754A1 (zh) |
DE (2) | DE60208786T2 (zh) |
ES (2) | ES2257543T3 (zh) |
IL (3) | IL163889A0 (zh) |
PT (2) | PT1493257E (zh) |
WO (1) | WO2003085924A1 (zh) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050027788A1 (en) * | 2003-06-17 | 2005-02-03 | Koopmans Christopher Raymond | Method and system for dynamic interleaving |
US20060109857A1 (en) * | 2004-11-19 | 2006-05-25 | Christian Herrmann | System, method and computer program product for dynamically changing message priority or message sequence number in a message queuing system based on processing conditions |
US20060200740A1 (en) * | 2004-06-25 | 2006-09-07 | Jessica Kahn | MIME type detection for feeds |
US20060271641A1 (en) * | 2005-05-26 | 2006-11-30 | Nicholas Stavrakos | Method and system for object prediction |
US20100005178A1 (en) * | 2006-10-24 | 2010-01-07 | Catalin Sindelaru | Method and system for firewall friendly real-time communication |
US20100082855A1 (en) * | 2008-09-29 | 2010-04-01 | Internatinal Business Machines Corporation | Associating process priority with i/o queuing |
US20130332782A1 (en) * | 2012-06-07 | 2013-12-12 | International Business Machines Corporation | Background buffering of content updates |
US8612844B1 (en) * | 2005-09-09 | 2013-12-17 | Apple Inc. | Sniffing hypertext content to determine type |
US20160105374A1 (en) * | 2014-10-10 | 2016-04-14 | Brocade Communications Systems, Inc. | Predictive prioritized server push of resources |
US10601958B2 (en) | 2012-07-18 | 2020-03-24 | Canon Kabushiki Kaisha | Information processing system and method for prioritized information transfer |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7139565B2 (en) | 2002-01-08 | 2006-11-21 | Seven Networks, Inc. | Connection architecture for a mobile network |
US20040158582A1 (en) * | 2003-02-11 | 2004-08-12 | Shuichi Takagi | Method and apparatus for synchronously transferring data from a local storage medium to a remote storage medium, and method and system for managing transfer of data from a source storage medium to a repository storage medium |
TWI234717B (en) * | 2003-12-04 | 2005-06-21 | Inst Information Industry | Method and system for dynamically determining web resource to be loaded and saving space |
US7673018B2 (en) | 2004-04-08 | 2010-03-02 | Research In Motion Limited | Message send queue reordering based on priority |
DE602004001666T2 (de) * | 2004-04-08 | 2006-11-30 | Research In Motion Ltd., Waterloo | Auf Priorität basiertes Wiedereinordnen in einer Sende-Warteschlange von Nachrichten |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
US8943304B2 (en) | 2006-08-03 | 2015-01-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9692725B2 (en) * | 2005-05-26 | 2017-06-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
US8533350B2 (en) * | 2005-11-01 | 2013-09-10 | Ravenwhite Inc. | Method and apparatus for storing information in a browser storage area of a client device |
EP1796338A1 (de) * | 2005-12-07 | 2007-06-13 | Siemens Aktiengesellschaft | Verfahren zur Kommunikation eines Clients mit einem Server sowie Client und Server zur Durchführung dieses Verfahrens |
JP4890610B2 (ja) * | 2006-05-05 | 2012-03-07 | トムソン ライセンシング | 遅延ダウンロード・サービスのためのスレショルド・ベース・ノーマライズド・レート・アーリエスト・デリバリ・ファースト(nredf) |
US9489456B1 (en) * | 2006-11-17 | 2016-11-08 | Blue Coat Systems, Inc. | Previewing file information over a network |
US7743160B2 (en) * | 2007-03-29 | 2010-06-22 | Blue Coat Systems, Inc. | System and method of delaying connection acceptance to support connection request processing at layer-7 |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8521891B1 (en) * | 2007-06-21 | 2013-08-27 | Mcafee, Inc. | Network browser system, method, and computer program product for conditionally loading a portion of data from a network based on a data transfer rate |
KR100925644B1 (ko) | 2007-10-22 | 2009-11-06 | 에스케이 텔레콤주식회사 | 오브젝트 전송 시스템 및 그 제어방법 |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US8850029B2 (en) * | 2008-02-14 | 2014-09-30 | Mcafee, Inc. | System, method, and computer program product for managing at least one aspect of a connection based on application behavior |
US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
JP5669460B2 (ja) * | 2010-06-30 | 2015-02-12 | キヤノン株式会社 | 情報処理装置、情報処理システム、情報処理装置の制御方法及びプログラム |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
US20120149352A1 (en) | 2010-07-26 | 2012-06-14 | Ari Backholm | Context aware traffic management for resource conservation in a wireless network |
EP3407673B1 (en) * | 2010-07-26 | 2019-11-20 | Seven Networks, LLC | Mobile network traffic coordination across multiple applications |
CN103229167A (zh) | 2010-10-06 | 2013-07-31 | 星汇数据解决方案公司 | 用于为电子发现数据编索引的系统和方法 |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
US8984164B2 (en) * | 2010-11-09 | 2015-03-17 | Usablenet Inc. | Methods for reducing latency in network connections and systems thereof |
US8868638B2 (en) | 2010-11-09 | 2014-10-21 | Usablenet Inc. | Methods for reducing latency in network connections using automatic redirects and systems thereof |
WO2012071283A1 (en) | 2010-11-22 | 2012-05-31 | Michael Luna | Aligning data transfer to optimize connections established for transmission over a wireless network |
US8769000B2 (en) * | 2011-02-01 | 2014-07-01 | Microsoft Corporation | Adaptive network communication techniques |
US9009253B2 (en) * | 2011-02-16 | 2015-04-14 | Yahoo! Inc. | Optimizing server resources using multiple retry for high traffic websites |
WO2012125347A1 (en) * | 2011-03-11 | 2012-09-20 | Citrix Systems, Inc. | SYSTEMS AND METHODS OF QoS FOR SINGLE STREAM ICA |
GB2493473B (en) | 2011-04-27 | 2013-06-19 | Seven Networks Inc | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
US20130104025A1 (en) * | 2011-10-20 | 2013-04-25 | Microsoft Corporation | Enabling immersive search engine home pages |
US9207754B2 (en) | 2011-10-20 | 2015-12-08 | Microsoft Technology Licensing, Llc | Enabling immersive, interactive desktop image presentation |
CN102668518B (zh) * | 2011-12-02 | 2013-10-02 | 华为技术有限公司 | 一种内容分发网络路由方法、系统和用户终端 |
US8934414B2 (en) | 2011-12-06 | 2015-01-13 | Seven Networks, Inc. | Cellular or WiFi mobile traffic optimization based on public or private network destination |
EP2789138B1 (en) | 2011-12-06 | 2016-09-14 | Seven Networks, LLC | A mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation |
GB2498064A (en) | 2011-12-07 | 2013-07-03 | Seven Networks Inc | Distributed content caching mechanism using a network operator proxy |
US9537899B2 (en) | 2012-02-29 | 2017-01-03 | Microsoft Technology Licensing, Llc | Dynamic selection of security protocol |
US9215127B2 (en) * | 2012-03-12 | 2015-12-15 | Network Coding, Inc. | Non-intrusive proxy system and method for applications without proxy support |
US8719426B1 (en) * | 2012-03-23 | 2014-05-06 | Google Inc. | Efficient proximity detection |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
US8923204B2 (en) * | 2012-05-29 | 2014-12-30 | Alcatel Lucent | Message handling extension using context artifacts |
WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
US9148383B2 (en) * | 2012-07-31 | 2015-09-29 | International Business Machines Corporation | Transparent middlebox with graceful connection entry and exit |
US9311280B2 (en) * | 2012-08-27 | 2016-04-12 | Qualcomm Innovation Center, Inc. | Re-ordering of iFrame execution to reduce network activity window |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
US9398066B1 (en) | 2013-03-06 | 2016-07-19 | Amazon Technologies, Inc. | Server defenses against use of tainted cache |
US9471533B1 (en) * | 2013-03-06 | 2016-10-18 | Amazon Technologies, Inc. | Defenses against use of tainted cache |
US8750123B1 (en) | 2013-03-11 | 2014-06-10 | Seven Networks, Inc. | Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
EP3057274A4 (en) * | 2013-10-07 | 2017-05-10 | Telefonica Digital España, S.L.U. | Method and system for defining the order in which web resources are obtained by a web browser |
CN106330845A (zh) * | 2015-07-02 | 2017-01-11 | 中兴通讯股份有限公司 | 一种传输流媒体数据的方法和装置 |
US20180063220A1 (en) * | 2016-08-30 | 2018-03-01 | Citrix Systems, Inc. | Systems and methods to provide hypertext transfer protocol 2.0 optimization through multiple links |
EP3772207B1 (en) * | 2019-08-01 | 2024-03-20 | ISS IP Holding LLC | Method and system for data transmission with significantly reduced latency losses |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5675721A (en) * | 1996-08-08 | 1997-10-07 | Freedman; Aaron S. | Computer network data distribution and selective retrieval system |
US5778372A (en) * | 1996-04-18 | 1998-07-07 | Microsoft Corporation | Remote retrieval and display management of electronic document with incorporated images |
WO1998043177A1 (en) | 1997-03-25 | 1998-10-01 | Intel Corporation | System for dynamically transcoding data transmitted between computers |
US5987466A (en) * | 1997-11-25 | 1999-11-16 | International Business Machines Corporation | Presenting web pages with discrete, browser-controlled complexity levels |
EP0992922A2 (en) | 1998-10-02 | 2000-04-12 | International Business Machines Corporation | Automatic image data quality adjustment to reduce response time of a Web server |
EP1011244A2 (en) | 1998-12-16 | 2000-06-21 | Lucent Technologies Inc. | Method and apparatus for transparently directing requests for web objects to proxy caches |
US6144996A (en) | 1998-05-13 | 2000-11-07 | Compaq Computer Corporation | Method and apparatus for providing a guaranteed minimum level of performance for content delivery over a network |
US6154769A (en) * | 1998-03-27 | 2000-11-28 | Hewlett-Packard Company | Scheduling server requests to decrease response time and increase server throughput |
WO2001042941A1 (en) | 1999-12-08 | 2001-06-14 | Edgix Corporation | Internet content delivery acceleration system employing a hybrid content selection scheme |
US6266742B1 (en) | 1997-10-27 | 2001-07-24 | International Business Machines Corporation | Algorithm for cache replacement |
US20010037389A1 (en) | 2000-03-29 | 2001-11-01 | Hideki Fujimori | Dynamic proxy server apparatus |
WO2001090912A1 (en) | 2000-05-25 | 2001-11-29 | Qmgn, Inc. | Enhanced downloading from a computer network and profiling of a user of a computer network |
US6343085B1 (en) * | 1997-08-28 | 2002-01-29 | Microsoft Corporation | Adaptive bandwidth throttling for individual virtual services supported on a network server |
US20020042848A1 (en) * | 2000-10-05 | 2002-04-11 | Alcatel | Method of providing services in a network management system having an open system architecture and also a service object, a request object and a request manager therefor |
US20020178232A1 (en) * | 1997-12-10 | 2002-11-28 | Xavier Ferguson | Method of background downloading of information from a computer network |
US20030200307A1 (en) * | 2000-03-16 | 2003-10-23 | Jyoti Raju | System and method for information object routing in computer networks |
US6658485B1 (en) * | 1998-10-19 | 2003-12-02 | International Business Machines Corporation | Dynamic priority-based scheduling in a message queuing system |
US6763371B1 (en) * | 1999-05-10 | 2004-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for collaborative communication in a communication network |
US6954429B2 (en) * | 2000-04-05 | 2005-10-11 | Dyband Corporation | Bandwidth control system |
US7340499B1 (en) * | 1999-12-03 | 2008-03-04 | Sun Microsystems, Inc. | Dynamic embedding of literal object data in supplied instance of information object |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5046121A (en) * | 1989-01-31 | 1991-09-03 | Konica Corporation | Image data compression apparatus |
US6512791B1 (en) * | 1991-05-15 | 2003-01-28 | Canon Kabushiki Kaisha | Image processing apparatus having means for controlling exposure using an orthogonal transformation coefficient |
JP4020966B2 (ja) * | 1995-12-21 | 2007-12-12 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 画像内のノイズ減少方法 |
US5826031A (en) * | 1996-06-10 | 1998-10-20 | Sun Microsystems, Inc. | Method and system for prioritized downloading of embedded web objects |
US6085193A (en) * | 1997-09-29 | 2000-07-04 | International Business Machines Corporation | Method and system for dynamically prefetching information via a server hierarchy |
JPH11284683A (ja) * | 1998-03-30 | 1999-10-15 | Canon Inc | データ転送装置とデータの転送方法、及び情報処理システム |
DE19964030A1 (de) * | 1999-12-30 | 2001-07-05 | Ibm | Effizientes Laden von Dokumenten auf dem Internet |
US7401118B1 (en) * | 2000-07-19 | 2008-07-15 | Hitachi, Ltd. | Web information preferential transfer system |
-
2002
- 2002-04-05 WO PCT/EP2002/003802 patent/WO2003085924A1/en active Application Filing
- 2002-04-05 PT PT02727530T patent/PT1493257E/pt unknown
- 2002-04-05 ES ES02727530T patent/ES2257543T3/es not_active Expired - Lifetime
- 2002-04-05 EP EP06000930A patent/EP1650931B1/en not_active Expired - Lifetime
- 2002-04-05 AT AT06000930T patent/ATE413763T1/de not_active IP Right Cessation
- 2002-04-05 CN CNB028287088A patent/CN100531186C/zh not_active Expired - Lifetime
- 2002-04-05 US US10/509,979 patent/US7721294B2/en not_active Expired - Lifetime
- 2002-04-05 DE DE60208786T patent/DE60208786T2/de not_active Expired - Lifetime
- 2002-04-05 AU AU2002257754A patent/AU2002257754A1/en not_active Abandoned
- 2002-04-05 PT PT06000930T patent/PT1650931E/pt unknown
- 2002-04-05 DE DE60229796T patent/DE60229796D1/de not_active Expired - Lifetime
- 2002-04-05 ES ES06000930T patent/ES2317348T3/es not_active Expired - Lifetime
- 2002-04-05 AT AT02727530T patent/ATE316312T1/de not_active IP Right Cessation
- 2002-04-05 EP EP02727530A patent/EP1493257B1/en not_active Expired - Lifetime
- 2002-04-05 IL IL16388902A patent/IL163889A0/xx unknown
-
2004
- 2004-09-02 IL IL163889A patent/IL163889A/en active IP Right Grant
-
2008
- 2008-02-26 IL IL189779A patent/IL189779A/en active IP Right Grant
- 2008-11-24 US US12/276,780 patent/US20090077205A1/en not_active Abandoned
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778372A (en) * | 1996-04-18 | 1998-07-07 | Microsoft Corporation | Remote retrieval and display management of electronic document with incorporated images |
US5675721A (en) * | 1996-08-08 | 1997-10-07 | Freedman; Aaron S. | Computer network data distribution and selective retrieval system |
WO1998043177A1 (en) | 1997-03-25 | 1998-10-01 | Intel Corporation | System for dynamically transcoding data transmitted between computers |
US6421733B1 (en) * | 1997-03-25 | 2002-07-16 | Intel Corporation | System for dynamically transcoding data transmitted between computers |
US6343085B1 (en) * | 1997-08-28 | 2002-01-29 | Microsoft Corporation | Adaptive bandwidth throttling for individual virtual services supported on a network server |
US6266742B1 (en) | 1997-10-27 | 2001-07-24 | International Business Machines Corporation | Algorithm for cache replacement |
US5987466A (en) * | 1997-11-25 | 1999-11-16 | International Business Machines Corporation | Presenting web pages with discrete, browser-controlled complexity levels |
US20020178232A1 (en) * | 1997-12-10 | 2002-11-28 | Xavier Ferguson | Method of background downloading of information from a computer network |
US6154769A (en) * | 1998-03-27 | 2000-11-28 | Hewlett-Packard Company | Scheduling server requests to decrease response time and increase server throughput |
US6144996A (en) | 1998-05-13 | 2000-11-07 | Compaq Computer Corporation | Method and apparatus for providing a guaranteed minimum level of performance for content delivery over a network |
US6563517B1 (en) * | 1998-10-02 | 2003-05-13 | International Business Machines Corp. | Automatic data quality adjustment to reduce response time in browsing |
EP0992922A2 (en) | 1998-10-02 | 2000-04-12 | International Business Machines Corporation | Automatic image data quality adjustment to reduce response time of a Web server |
US6658485B1 (en) * | 1998-10-19 | 2003-12-02 | International Business Machines Corporation | Dynamic priority-based scheduling in a message queuing system |
EP1011244A2 (en) | 1998-12-16 | 2000-06-21 | Lucent Technologies Inc. | Method and apparatus for transparently directing requests for web objects to proxy caches |
US6763371B1 (en) * | 1999-05-10 | 2004-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for collaborative communication in a communication network |
US7340499B1 (en) * | 1999-12-03 | 2008-03-04 | Sun Microsystems, Inc. | Dynamic embedding of literal object data in supplied instance of information object |
WO2001042941A1 (en) | 1999-12-08 | 2001-06-14 | Edgix Corporation | Internet content delivery acceleration system employing a hybrid content selection scheme |
US20030200307A1 (en) * | 2000-03-16 | 2003-10-23 | Jyoti Raju | System and method for information object routing in computer networks |
US20010037389A1 (en) | 2000-03-29 | 2001-11-01 | Hideki Fujimori | Dynamic proxy server apparatus |
US6954429B2 (en) * | 2000-04-05 | 2005-10-11 | Dyband Corporation | Bandwidth control system |
WO2001090912A1 (en) | 2000-05-25 | 2001-11-29 | Qmgn, Inc. | Enhanced downloading from a computer network and profiling of a user of a computer network |
US20020042848A1 (en) * | 2000-10-05 | 2002-04-11 | Alcatel | Method of providing services in a network management system having an open system architecture and also a service object, a request object and a request manager therefor |
Non-Patent Citations (6)
Title |
---|
European Patent Office, International Search Report for PCT/EP02/03802, dated Nov. 5, 2002. |
Fielding, et al., "Hypertext Transfer Protocol-HTTP/1.1", Network Working Group, Jun. 1999. |
Gilbert, et al., Globally Progressive Interactive Web Delivery. |
Gilbert, Jeff, "Prioritization and Retransmission Within MEMUX", Feb. 18, 1999. |
Keshav, Srinivasan "An engineering approach to computer networking: ATM networks, the internet, and the telephone network", Addison-Wesley, 1997. * |
Masahiro Hori etal. "Annotation of Web Content for Transcoding", Jul. 10, 1999. |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050027788A1 (en) * | 2003-06-17 | 2005-02-03 | Koopmans Christopher Raymond | Method and system for dynamic interleaving |
US10361959B2 (en) * | 2003-06-17 | 2019-07-23 | Citrix Systems, Inc. | Method and system for dynamic interleaving |
US10313252B2 (en) | 2003-06-17 | 2019-06-04 | Citrix Systems, Inc. | Method and system for dynamic interleaving |
US20160269299A1 (en) * | 2003-06-17 | 2016-09-15 | Citrix Systems, Inc. | Method and system for dynamic interleaving |
US9357033B2 (en) * | 2003-06-17 | 2016-05-31 | Citrix Systems, Inc. | Method and system for dynamic interleaving |
US20060200740A1 (en) * | 2004-06-25 | 2006-09-07 | Jessica Kahn | MIME type detection for feeds |
US7900131B2 (en) | 2004-06-25 | 2011-03-01 | Apple Inc. | Determining when a file contains a feed |
US20060109857A1 (en) * | 2004-11-19 | 2006-05-25 | Christian Herrmann | System, method and computer program product for dynamically changing message priority or message sequence number in a message queuing system based on processing conditions |
US8023408B2 (en) * | 2004-11-19 | 2011-09-20 | International Business Machines Corporation | Dynamically changing message priority or message sequence number |
US8856279B2 (en) * | 2005-05-26 | 2014-10-07 | Citrix Systems Inc. | Method and system for object prediction |
US20060271641A1 (en) * | 2005-05-26 | 2006-11-30 | Nicholas Stavrakos | Method and system for object prediction |
US8612844B1 (en) * | 2005-09-09 | 2013-12-17 | Apple Inc. | Sniffing hypertext content to determine type |
US20100005178A1 (en) * | 2006-10-24 | 2010-01-07 | Catalin Sindelaru | Method and system for firewall friendly real-time communication |
US9262357B2 (en) | 2008-09-29 | 2016-02-16 | International Business Machines Corporation | Associating process priority with I/O queuing |
US20100082855A1 (en) * | 2008-09-29 | 2010-04-01 | Internatinal Business Machines Corporation | Associating process priority with i/o queuing |
US9959229B2 (en) | 2008-09-29 | 2018-05-01 | International Business Machines Corporation | Associating process priority with I/O queuing |
US9037926B2 (en) * | 2012-06-07 | 2015-05-19 | International Business Machines Corporation | Background buffering of content updates |
US20130332782A1 (en) * | 2012-06-07 | 2013-12-12 | International Business Machines Corporation | Background buffering of content updates |
US10601958B2 (en) | 2012-07-18 | 2020-03-24 | Canon Kabushiki Kaisha | Information processing system and method for prioritized information transfer |
US11258882B2 (en) | 2012-07-18 | 2022-02-22 | Canon Kabushiki Kaisha | Information processing device, method, and storage medium for prioritized content acquisition |
US20160105374A1 (en) * | 2014-10-10 | 2016-04-14 | Brocade Communications Systems, Inc. | Predictive prioritized server push of resources |
US9992263B2 (en) * | 2014-10-10 | 2018-06-05 | Pulse Secure, Llc | Predictive prioritized server push of resources |
Also Published As
Publication number | Publication date |
---|---|
ES2257543T3 (es) | 2006-08-01 |
ES2317348T3 (es) | 2009-04-16 |
EP1493257B1 (en) | 2006-01-18 |
PT1493257E (pt) | 2006-06-30 |
DE60229796D1 (de) | 2008-12-18 |
CN100531186C (zh) | 2009-08-19 |
IL189779A (en) | 2010-05-17 |
IL163889A0 (en) | 2005-12-18 |
PT1650931E (pt) | 2009-02-13 |
ATE413763T1 (de) | 2008-11-15 |
CN1625877A (zh) | 2005-06-08 |
IL163889A (en) | 2010-02-17 |
US20090077205A1 (en) | 2009-03-19 |
DE60208786T2 (de) | 2006-09-28 |
EP1493257A1 (en) | 2005-01-05 |
ATE316312T1 (de) | 2006-02-15 |
US20050240940A1 (en) | 2005-10-27 |
DE60208786D1 (de) | 2006-04-06 |
IL189779A0 (en) | 2008-08-07 |
WO2003085924A1 (en) | 2003-10-16 |
AU2002257754A1 (en) | 2003-10-20 |
EP1650931A1 (en) | 2006-04-26 |
EP1650931B1 (en) | 2008-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7721294B2 (en) | Object transfer control in a communications network | |
US8078759B2 (en) | Method for prefetching of structured data between a client device and a server device | |
US10313252B2 (en) | Method and system for dynamic interleaving | |
US6854018B1 (en) | System and method for intelligent web content fetch and delivery of any whole and partial undelivered objects in ascending order of object size | |
JP5795327B2 (ja) | Http最適化、マルチホーミング、移動性、および、優先度 | |
US6959318B1 (en) | Method of proxy-assisted predictive pre-fetching with transcoding | |
US11263284B2 (en) | Method and system for loading web page, and server | |
US6848000B1 (en) | System and method for improved handling of client state objects | |
US7552220B2 (en) | System and method to refresh proxy cache server objects | |
EP2507938B1 (en) | System and methods for efficient media delivery using cache | |
KR100307374B1 (ko) | 지연을감소시키고사용자제어를향상시키기위한인터넷데이터전송의여과된사용 | |
US9158845B1 (en) | Reducing latencies in web page rendering | |
EP2175383A1 (en) | Method and apparatus for improving file access performance of distributed storage system | |
KR20080015422A (ko) | 긴 지연 링크를 통한 http의 성능을 향상시키는 방법및 장치 | |
EP2853074B1 (en) | Methods for optimizing service of content requests and devices thereof | |
US11159642B2 (en) | Site and page specific resource prioritization | |
US20020138660A1 (en) | Method and system for the redirection of client requests | |
US11128733B2 (en) | Server-side resource prioritization | |
US20060155819A1 (en) | Methods and system for using caches | |
US20070153783A1 (en) | Methods, systems, and products for condensing messages | |
JP2004513405A (ja) | クライアント/サーバ・ネットワークでリンク・ファイルを順序付き先行キャッシングするシステム、方法およびプログラム | |
KR100647419B1 (ko) | 데이터 통신을 위한 예측적인 데이터 캐쉬 방법 | |
KR20030042658A (ko) | 브라우저가 저장된 기록매체 및 이를 이용한 데이터다운로드 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:QUINET, RAPHAEL;SCHAFFRATH, DANIEL;REEL/FRAME:015333/0084;SIGNING DATES FROM 20040927 TO 20041011 Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL),SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:QUINET, RAPHAEL;SCHAFFRATH, DANIEL;SIGNING DATES FROM 20040927 TO 20041011;REEL/FRAME:015333/0084 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552) Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |